Chapter 13. Cyber Detective
After reading this chapter and completing the exercises, you will be able to do the following:
Find contact information on the Web
Locate court records on the Web
Locate criminal records on the Web
Use Usenet newsgroups to gather information
In the preceding chapters we have examined many facets of computer security. Three of those issues led us to the content of this chapter. The first is identity theft, the second is hacking, and the third is investigating potential employees for sensitive positions.
In order for a criminal to perpetrate identity theft, she has to take a small amount of information she finds on her target and use that to garner even more information. Perhaps a ...